CVE-2024-40785

This issue was addressed with improved checks. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, Safari 17.6, iOS 17.6 and iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. Processing maliciously crafted web content may lead to a cross site scripting attack.
References
Link Resource
http://seclists.org/fulldisclosure/2024/Jul/15 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/16 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/17 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/18 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/21 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/22 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jul/23 Mailing List Third Party Advisory
https://support.apple.com/en-us/HT214116 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214117 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214119 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214121 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214122 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214123 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214124 Release Notes Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

15 Aug 2024, 16:46

Type Values Removed Values Added
CPE cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*
cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
References () http://seclists.org/fulldisclosure/2024/Jul/15 - () http://seclists.org/fulldisclosure/2024/Jul/15 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/16 - () http://seclists.org/fulldisclosure/2024/Jul/16 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/17 - () http://seclists.org/fulldisclosure/2024/Jul/17 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/21 - () http://seclists.org/fulldisclosure/2024/Jul/21 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/22 - () http://seclists.org/fulldisclosure/2024/Jul/22 - Mailing List, Third Party Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/23 - () http://seclists.org/fulldisclosure/2024/Jul/23 - Mailing List, Third Party Advisory
References () https://support.apple.com/en-us/HT214116 - () https://support.apple.com/en-us/HT214116 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214117 - () https://support.apple.com/en-us/HT214117 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214119 - () https://support.apple.com/en-us/HT214119 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214121 - () https://support.apple.com/en-us/HT214121 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214122 - () https://support.apple.com/en-us/HT214122 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214123 - () https://support.apple.com/en-us/HT214123 - Release Notes, Vendor Advisory
References () https://support.apple.com/en-us/HT214124 - () https://support.apple.com/en-us/HT214124 - Release Notes, Vendor Advisory
CWE CWE-79
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
First Time Apple watchos
Apple iphone Os
Apple tvos
Apple ipados
Apple macos
Apple safari
Apple
Apple visionos

30 Jul 2024, 13:32

Type Values Removed Values Added
Summary
  • (es) Este problema se solucionó con controles mejorados. Este problema se solucionó en iOS 16.7.9 y iPadOS 16.7.9, Safari 17.6, iOS 17.6 y iPadOS 17.6, watchOS 10.6, tvOS 17.6, visionOS 1.3, macOS Sonoma 14.6. El procesamiento de contenido web creado con fines malintencionados puede provocar un ataque de Cross Site Scripting.

30 Jul 2024, 02:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/17 -
  • () http://seclists.org/fulldisclosure/2024/Jul/18 -
  • () http://seclists.org/fulldisclosure/2024/Jul/21 -
  • () http://seclists.org/fulldisclosure/2024/Jul/22 -
  • () http://seclists.org/fulldisclosure/2024/Jul/23 -

30 Jul 2024, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2024/Jul/15 -
  • () http://seclists.org/fulldisclosure/2024/Jul/16 -

29 Jul 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-29 23:15

Updated : 2024-08-15 16:46


NVD link : CVE-2024-40785

Mitre link : CVE-2024-40785

CVE.ORG link : CVE-2024-40785


JSON object : View

Products Affected

apple

  • macos
  • visionos
  • watchos
  • iphone_os
  • ipados
  • safari
  • tvos
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')